240 computer-programmer-"https:"-"UCL" "https:" "https:" "https:" "INESC ID" positions at Virginia Tech
Sort by
Refine Your Search
-
Category
-
Program
-
Field
-
general direction. As a Enterprise Integration Developer, you will: ● Design, develop and maintain API, Database, and File integrations within the Boomi platform in support of the University’s ERP and
-
/mentor/provide training and coordinate the work of graduate research assistants, technicians, and others who assist in specific assignments. Required Qualifications • M.S. degree in Computer
-
. The manager will develop an annual work plan in consultation with the two supervisors and is evaluated on the success of that plan. The Department of Engineering Education (http://www.enge.vt.edu) is home to
-
extramurally-funded research program as a mid-career or senior level faculty member. In addition to leading their own research program, they will develop new advanced imaging technologies for use by
-
across the Virginia Tech campus and at the Children’s National Hospital. The successful candidates will primarily be expected to maintain a high-quality, extramurally-funded cancer research program. They
-
skills. Demonstrated ability to work effectively with student-athletes, coaches, and other university staff. Preferred Qualifications Former wrestler or coach with a NCAA Division I Power 4 program
-
research and progress reports. • Teaching: Pursuing limited teaching opportunities as appropriate. A formalized mentoring plan will be co-developed with Dr. Marston at the start of the position to align
-
successful candidate will develop a nationally recognized program that integrates research (60%) and Extension (40%). The ideal candidate will present a clear and compelling vision for establishing
-
at Virginia Tech's main campus in Blacksburg, VA, in an area consistently ranked among the country's best places to live. In addition, our program in the Washington, D.C. area offers unique proximity
-
program analysis for detecting violations of safety and security properties, techniques for verified operating system kernel extensions, logic frameworks for automatic reasoning of security vulnerabilities